page_type | languages | products | name | description | urlFragment | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|
sample |
|
|
Deploy Spring Boot apps using Azure Spring Apps |
Deploy Spring Boot apps using Azure Spring Apps |
spring-petclinic-microservices |
This sample is an AZD template for a Spring Boot Pet Clinic application split into microservices running on Azure Spring Apps.
Let's jump in and get this up and running in Azure. When you are finished, you will have a fully functional Spring Petclinic application deployed to the cloud. In later steps, you'll see how to setup a pipeline and run the application.
The following prerequisites are required to use this application. Please ensure that you have them all installed locally.
- Azure Developer CLI 1.2.0 or later
- Java 17 or later - for API backend
- Powershell 7 if you use windows
If you are using Azure Developer CLI with the version lower than 1.2.0, then you will need to enable the feature for Azure Spring Apps support manually by the following command:
azd config set alpha.springapp on
To learn how to get started with any template, follow the steps in this quickstart with this template(Azure-Samples/spring-petclinic-microservices
).
This quickstart will show you how to authenticate on Azure, initialize using a template, provision infrastructure and deploy code on Azure via the following commands:
# Log in to azd. Only required once per-install.
azd auth login
# First-time project setup. Initialize a project in the current directory, using this template.
azd init --template Azure-Samples/spring-petclinic-microservices
# Provision and deploy to Azure
azd up
This application utilizes the following Azure resources:
- Azure Spring Apps to host the application
The Architecture diagram of the Spring Petclinic Microservices is shown as below:
This template provisions resources to an Azure subscription that you will select upon provisioning them. Please refer to the Pricing calculator for Microsoft Azure and, if needed, update the included Azure resource definitions found in
infra/main.bicep
to suit your needs.
This template is structured to follow the Azure Developer CLI. You can learn more about azd
architecture in the official documentation.
At this point, you have a complete application deployed on Azure. But there is much more that the Azure Developer CLI can do. These next steps will introduce you to additional commands that will make creating applications on Azure much easier. Using the Azure Developer CLI, you can delete the resources easily.
azd down
- to delete all the Azure resources created with this template
The Azure Developer CLI includes many other commands to help with your Azure development experience. You can view these commands at the terminal by running azd help
. You can also view the full list of commands on our Azure Developer CLI command page.
This template creates the managed identity for your apps inside your Azure Active Directory tenant, and they are used to authenticate your apps with Azure and other services that support Azure AD authentication like Key Vault via access policies. You will see principalId referenced in the infrastructure as code files, that refers to the id of the currently logged in Azure Developer CLI user, which will be granted access policies and permissions to run the application locally. To view your managed identity in the Azure Portal, follow these steps.
If you have any feature requests, issues, or areas for improvement, please file an issue. To keep up-to-date, ask questions, or share suggestions, join our GitHub Discussions. You may also contact us via [email protected].
Azure Spring Apps enables you to easily run a Spring Boot applications on Azure.
This quickstart shows you how to deploy an existing Java Spring Cloud application to Azure. When you're finished, you can continue to manage the application via the Azure CLI or switch to using the Azure Portal.
You will:
- Build existing Spring Boot applications
- Provision an Azure Spring Apps service instance. If you prefer Terraform, you may also provision using Terraform, see
README-terraform
- Deploy applications to Azure
- Connect applications to Azure Database for MySQL using Azure AD authentication
- Open the application
- Monitor applications
- Automate deployments using GitHub Actions
- Manage application secrets using Azure KeyVault
In order to deploy a Java app to cloud, you need an Azure subscription. If you do not already have an Azure subscription, you can activate your MSDN subscriber benefits or sign up for a free Azure account.
In addition, you will need the following:
| Azure CLI version 2.44.0 or higher | Java 17 | Maven | Git |
Note - The Bash shell. While Azure CLI should behave identically on all environments, shell semantics vary. Therefore, only bash can be used with the commands in this repo. To complete these repo steps on Windows, use Git Bash that accompanies the Windows distribution of
Or, you can use the Azure Cloud Shell. Azure hosts Azure Cloud Shell, an interactive shell environment that you can use through your browser. You can use the Bash with Cloud Shell to work with Azure services. You can use the Cloud Shell pre-installed commands to run the code in this README without having to install anything on your local environment. To start Azure Cloud Shell: go to https://shell.azure.com, or select the Launch Cloud Shell button to open Cloud Shell in your browser.
To run the code in this article in Azure Cloud Shell:
-
Start Cloud Shell.
-
Select the Copy button on a code block to copy the code.
-
Paste the code into the Cloud Shell session by selecting Ctrl+Shift+V on Windows and Linux or by selecting Cmd+Shift+V on macOS.
-
Select Enter to run the code.
Install the Azure Spring extension for the Azure CLI using the following command
az extension add --name spring
Note - spring
CLI extension 1.5.0
or later is a pre-requisite to enable the latest Java in-process agent for Application Insights. If you already have the CLI extension, you may need to upgrade to the latest using --
az extension update --name spring
mkdir source-code
git clone https://github.com/azure-samples/spring-petclinic-microservices
cd spring-petclinic-microservices
./mvnw clean package -DskipTests
This will take a few minutes.
Create a bash script with environment variables by making a copy of the supplied template:
cp .scripts/setup-env-variables-azure-template.sh .scripts/setup-env-variables-azure.sh
Open .scripts/setup-env-variables-azure.sh
and enter the following information:
export SUBSCRIPTION=subscription-id # customize this
export RESOURCE_GROUP=resource-group-name # customize this
...
export SPRING_CLOUD_SERVICE=azure-spring-cloud-name # customize this
...
export MYSQL_SERVER_NAME=mysql-servername # customize this
...
export MYSQL_SERVER_ADMIN_NAME=admin-name # customize this
...
export MYSQL_SERVER_ADMIN_PASSWORD=SuperS3cr3t # customize this
...
Then, set the environment:
source .scripts/setup-env-variables-azure.sh
Login to the Azure CLI and choose your active subscription. Be sure to choose the active subscription that is whitelisted for Azure Spring Apps
az login
az account list -o table
az account set --subscription ${SUBSCRIPTION}
Prepare a name for your Azure Spring App service. The name must be between 4 and 32 characters long and can contain only lowercase letters, numbers, and hyphens. The first character of the service name must be a letter and the last character must be either a letter or a number.
Create a resource group to contain your Azure Spring App service.
az group create --name ${RESOURCE_GROUP} \
--location ${REGION}
Create an instance of Azure Spring App.
az spring create --name ${SPRING_CLOUD_SERVICE} \
--sku standard \
--sampling-rate 100 \
--resource-group ${RESOURCE_GROUP} \
--location ${REGION}
The service instance will take around five minutes to deploy.
Set your default resource group name and cluster name using the following commands:
az configure --defaults \
group=${RESOURCE_GROUP} \
location=${REGION} \
spring=${SPRING_CLOUD_SERVICE}
Create a Log Analytics Workspace using Azure CLI:
az monitor log-analytics workspace create \
--workspace-name ${LOG_ANALYTICS} \
--resource-group ${RESOURCE_GROUP} \
--location ${REGION}
export LOG_ANALYTICS_RESOURCE_ID=$(az monitor log-analytics workspace show \
--resource-group ${RESOURCE_GROUP} \
--workspace-name ${LOG_ANALYTICS} \
--query 'id' \
--output tsv)
export SPRING_CLOUD_RESOURCE_ID=$(az spring show \
--name ${SPRING_CLOUD_SERVICE} \
--resource-group ${RESOURCE_GROUP} \
--query 'id' \
--output tsv)
Setup diagnostics and publish logs and metrics from Spring Boot apps to Azure Log Analytics:
az monitor diagnostic-settings create --name "send-logs-and-metrics-to-log-analytics" \
--resource ${SPRING_CLOUD_RESOURCE_ID} \
--workspace ${LOG_ANALYTICS_RESOURCE_ID} \
--logs '[
{
"category": "ApplicationConsole",
"enabled": true,
"retentionPolicy": {
"enabled": false,
"days": 0
}
},
{
"category": "SystemLogs",
"enabled": true,
"retentionPolicy": {
"enabled": false,
"days": 0
}
},
{
"category": "IngressLogs",
"enabled": true,
"retentionPolicy": {
"enabled": false,
"days": 0
}
}
]' \
--metrics '[
{
"category": "AllMetrics",
"enabled": true,
"retentionPolicy": {
"enabled": false,
"days": 0
}
}
]'
Use the config-file.yml
in the root of this project to load configuration into the Config Server in Azure Spring Apps.
az spring config-server set \
--config-file config-file.yml \
--name ${SPRING_CLOUD_SERVICE}
Create 5 apps.
az spring app create --name ${API_GATEWAY} --instance-count 1 --assign-endpoint true \
--memory 2Gi \
--runtime-version Java_17 \
--jvm-options='-Xms2048m -Xmx2048m'
az spring app create --name ${ADMIN_SERVER} --instance-count 1 --assign-endpoint true \
--memory 2Gi \
--runtime-version Java_17 \
--jvm-options='-Xms2048m -Xmx2048m'
az spring app create --name ${CUSTOMERS_SERVICE} --instance-count 1 \
--memory 2Gi \
--runtime-version Java_17 \
--jvm-options='-Xms2048m -Xmx2048m'
az spring app create --name ${VETS_SERVICE} --instance-count 1 \
--memory 2Gi \
--runtime-version Java_17 \
--jvm-options='-Xms2048m -Xmx2048m'
az spring app create --name ${VISITS_SERVICE} --instance-count 1 \
--memory 2Gi \
--runtime-version Java_17 \
--jvm-options='-Xms2048m -Xmx2048m'
Create a MySQL database in Azure Database for MySQL.
# create mysql server and provide access from Azure resources
az mysql flexible-server create \
--name ${MYSQL_SERVER_NAME} \
--resource-group ${RESOURCE_GROUP} \
--location ${REGION} \
--admin-user ${MYSQL_SERVER_ADMIN_NAME} \
--admin-password ${MYSQL_SERVER_ADMIN_PASSWORD} \
--public-access 0.0.0.0 \
--tier Burstable \
--sku-name Standard_B1ms \
--storage-size 32
# allow access from your dev machine for testing
MY_IP=$(curl http://whatismyip.akamai.com)
az mysql flexible-server firewall-rule create \
--resource-group ${RESOURCE_GROUP} \
--name ${MYSQL_SERVER_NAME} \
--rule-name devMachine \
--start-ip-address ${MY_IP} \
--end-ip-address ${MY_IP}
# create database
az mysql flexible-server db create \
--resource-group ${RESOURCE_GROUP} \
--server-name ${MYSQL_SERVER_NAME} \
--database-name ${MYSQL_DATABASE_NAME}
# increase connection timeout
az mysql flexible-server parameter set \
--resource-group ${RESOURCE_GROUP} \
--server ${MYSQL_SERVER_NAME} \
--name wait_timeout \
--value 2147483
# set timezone
az mysql flexible-server parameter set \
--resource-group ${RESOURCE_GROUP} \
--server ${MYSQL_SERVER_NAME} \
--name time_zone \
--value "US/Pacific"
# create managed identity for mysql. By assigning the identity to the mysql server, it will enable Azure AD authentication
az identity create \
--name ${MYSQL_IDENTITY} \
--resource-group ${RESOURCE_GROUP} \
--location ${REGION}
IDENTITY_ID=$(az identity show --name ${MYSQL_IDENTITY} --resource-group ${RESOURCE_GROUP} --query id -o tsv)
# Customer service connection
az spring connection create mysql-flexible \
--resource-group ${RESOURCE_GROUP} \
--service ${SPRING_CLOUD_SERVICE} \
--app ${CUSTOMERS_SERVICE} \
--deployment default \
--tg ${RESOURCE_GROUP} \
--server ${MYSQL_SERVER_NAME} \
--database ${MYSQL_DATABASE_NAME} \
--system-identity mysql-identity-id=$IDENTITY_ID \
--client-type springboot \
--yes
# Vets service connection
az spring connection create mysql-flexible \
--resource-group ${RESOURCE_GROUP} \
--service ${SPRING_CLOUD_SERVICE} \
--app ${VETS_SERVICE} \
--deployment default \
--tg ${RESOURCE_GROUP} \
--server ${MYSQL_SERVER_NAME} \
--database ${MYSQL_DATABASE_NAME} \
--system-identity mysql-identity-id=$IDENTITY_ID \
--client-type springboot \
--yes
# Visits service connection
az spring connection create mysql-flexible \
--resource-group ${RESOURCE_GROUP} \
--service ${SPRING_CLOUD_SERVICE} \
--app ${VISITS_SERVICE} \
--deployment default \
--tg ${RESOURCE_GROUP} \
--server ${MYSQL_SERVER_NAME} \
--database ${MYSQL_DATABASE_NAME} \
--system-identity mysql-identity-id=$IDENTITY_ID \
--client-type springboot \
--yes
Deploy Spring Boot applications to Azure.
az spring app deploy \
--resource-group ${RESOURCE_GROUP} \
--service ${SPRING_CLOUD_SERVICE} \
--name ${API_GATEWAY} \
--artifact-path ${API_GATEWAY_JAR} \
--jvm-options='-Xms2048m -Xmx2048m' \
--env SPRING_PROFILES_ACTIVE=passwordless
az spring app deploy \
--resource-group ${RESOURCE_GROUP} \
--service ${SPRING_CLOUD_SERVICE} \
--name ${ADMIN_SERVER} \
--artifact-path ${ADMIN_SERVER_JAR} \
--jvm-options='-Xms2048m -Xmx2048m' \
--env SPRING_PROFILES_ACTIVE=passwordless
az spring app deploy \
--resource-group ${RESOURCE_GROUP} \
--service ${SPRING_CLOUD_SERVICE} \
--name ${CUSTOMERS_SERVICE} \
--artifact-path ${CUSTOMERS_SERVICE_JAR} \
--jvm-options='-Xms2048m -Xmx2048m' \
--env SPRING_PROFILES_ACTIVE=passwordless
az spring app deploy \
--resource-group ${RESOURCE_GROUP} \
--service ${SPRING_CLOUD_SERVICE} \
--name ${VETS_SERVICE} \
--artifact-path ${VETS_SERVICE_JAR} \
--jvm-options='-Xms2048m -Xmx2048m' \
--env SPRING_PROFILES_ACTIVE=passwordless
az spring app deploy \
--resource-group ${RESOURCE_GROUP} \
--service ${SPRING_CLOUD_SERVICE} \
--name ${VISITS_SERVICE} \
--artifact-path ${VISITS_SERVICE_JAR} \
--jvm-options='-Xms2048m -Xmx2048m' \
--env SPRING_PROFILES_ACTIVE=passwordless
az spring app show --name ${API_GATEWAY} --query properties.url --output tsv
Navigate to the URL provided by the previous command to open the Pet Clinic application.
Open the Petclinic application and try out a few tasks - view pet owners and their pets, vets, and schedule pet visits:
open https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/
You can also curl
the REST API exposed by the Petclinic application. The admin REST
API allows you to create/update/remove items in Pet Owners, Pets, Vets and Visits.
You can run the following curl commands:
curl -X GET https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/customer/owners
curl -X GET https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/customer/owners/4
curl -X GET https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/customer/petTypes
curl -X GET https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/customer/owners/3/pets/4
curl -X GET https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/customer/owners/6/pets/8
curl -X GET https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/vet/vets
curl -X GET https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/visit/owners/6/pets/8/visits
curl -X GET https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/visit/owners/6/pets/8/visits
Use the following command to get the latest 100 lines of app console logs from Customers Service.
az spring app logs -n ${CUSTOMERS_SERVICE} --lines 100
By adding a -f
parameter you can get real-time log streaming from the app. Try log streaming for the API Gateway app.
az spring app logs -n ${API_GATEWAY} -f
You can use az spring app logs -h
to explore more parameters and log stream functionalities.
Spring Boot includes a number of additional features to help you monitor and manage your application when you push it to production (Spring Boot Actuator: Production-ready Features). You can choose to manage and monitor your application by using HTTP endpoints or with JMX. Auditing, health, and metrics gathering can also be automatically applied to your application.
Actuator endpoints let you monitor and interact with your application. By default, Spring Boot application exposes health
and info
endpoints to show arbitrary application info and health information. Apps in this project are pre-configured to expose all the Actuator endpoints.
You can try them out by opening the following app actuator endpoints in a browser:
open https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/actuator/
open https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/actuator/env
open https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/actuator/configprops
open https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/customer/actuator
open https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/customer/actuator/env
open https://${SPRING_CLOUD_SERVICE}-${API_GATEWAY}.azuremicroservices.io/api/customer/actuator/configprops
Open the Application Insights created by Azure Spring Apps and start monitoring Spring Boot applications. You can find the Application Insights in the same Resource Group where you created an Azure Spring Apps service instance.
Navigate to the Application Map
blade:
Navigate to the Performance
blade:
Navigate to the Performance/Dependencies
blade - you can see the performance number for dependencies,
particularly SQL calls:
Click on a SQL call to see the end-to-end transaction in context:
Navigate to the Failures/Exceptions
blade - you can see a collection of exceptions:
Click on an exception to see the end-to-end transaction and stacktrace in context:
Navigate to the Metrics
blade - you can see metrics contributed by Spring Boot apps,
Spring Cloud modules, and dependencies.
The chart below shows gateway-requests
(Spring Cloud Gateway), hikaricp_connections
(JDBC Connections) and http_client_requests
.
Spring Boot registers a lot number of core metrics: JVM, CPU, Tomcat, Logback...
The Spring Boot auto-configuration enables the instrumentation of requests handled by Spring MVC.
All those three REST controllers OwnerResource
, PetResource
and VisitResource
have been instrumented by the @Timed
Micrometer annotation at class level.
customers-service
application has the following custom metrics enabled:- @Timed:
petclinic.owner
- @Timed:
petclinic.pet
- @Timed:
visits-service
application has the following custom metrics enabled:- @Timed:
petclinic.visit
- @Timed:
You can see these custom metrics in the Metrics
blade:
You can use the Availability Test feature in Application Insights and monitor the availability of applications:
Navigate to the Live Metrics
blade - you can see live metrics on screen with low latencies < 1 second:
Open the Log Analytics that you created - you can find the Log Analytics in the same Resource Group where you created an Azure Spring Apps service instance.
In the Log Analyics page, selects Logs
blade and run any of the sample queries supplied below for Azure Spring Apps.
Type and run the following Kusto query to see application logs:
AppPlatformLogsforSpring
| where TimeGenerated > ago(24h)
| limit 500
| sort by TimeGenerated
Type and run the following Kusto query to see customers-service
application logs:
AppPlatformLogsforSpring
| where AppName has "customers"
| limit 500
| sort by TimeGenerated
Type and run the following Kusto query to see errors and exceptions thrown by each app:
AppPlatformLogsforSpring
| where Log contains "error" or Log contains "exception"
| extend FullAppName = strcat(ServiceName, "/", AppName)
| summarize count_per_app = count() by FullAppName, ServiceName, AppName, _ResourceId
| sort by count_per_app desc
| render piechart
Type and run the following Kusto query to see all in the inbound calls into Azure Spring Apps:
AppPlatformIngressLogs
| project TimeGenerated, RemoteAddr, Host, Request, Status, BodyBytesSent, RequestTime, ReqId, RequestHeaders
| sort by TimeGenerated
Type and run the following Kusto query to see all the logs from the managed Spring Cloud Config Server managed by Azure Spring Apps:
AppPlatformSystemLogs
| where LogType contains "ConfigServer"
| project TimeGenerated, Level, LogType, ServiceName, Log
| sort by TimeGenerated
Type and run the following Kusto query to see all the logs from the managed Spring Cloud Service Registry managed by Azure Spring Apps:
AppPlatformSystemLogs
| where LogType contains "ServiceRegistry"
| project TimeGenerated, Level, LogType, ServiceName, Log
| sort by TimeGenerated
AZURE_CLIENT_ID=$(az ad app create --display-name github-petclinic-actions --query appId --output tsv)
GITHUB_OBJECTID=$(az ad app show --id $AZURE_CLIENT_ID --query id --output tsv)
- AZURE_TENANT_ID: The tenant ID of the Azure subscription hosting the Azure Spring Apps instance.
- AZURE_SUBSCRIPTION_ID: The subscription ID of the Azure subscription hosting the Azure Spring Apps instance.
- AZURE_CLIENT_ID: The client ID of the Azure Active Directory application created in the previous step.
- RESOURCE_GROUP: The resource group hosting the Azure Spring Apps instance.
- SPRING_APPS_SERVICE_NAME: The name of the Azure Spring Apps instance.
As you can see, there are not real confidential values, as even if someone gets access to them, they can't do anything with them. They can be replaced by environment variables.
You will see GitHub Actions triggered to build and deploy all the apps in the repo to your Azure Spring Apps instance.
Enable System Assigned Identities for applications and export identities to environment.
az spring app identity assign --name ${CUSTOMERS_SERVICE}
export CUSTOMERS_SERVICE_IDENTITY=$(az spring app show --name ${CUSTOMERS_SERVICE} --query 'identity.principalId' --output tsv)
az spring app identity assign --name ${VETS_SERVICE}
export VETS_SERVICE_IDENTITY=$(az spring app show --name ${VETS_SERVICE} --query 'identity.principalId' --output tsv)
az spring app identity assign --name ${VISITS_SERVICE}
export VISITS_SERVICE_IDENTITY=$(az spring app show --name ${VISITS_SERVICE} --query 'identity.principalId' --output tsv)
Configuration repo contains a profile for passwordless access to MySql. To activate it, we need to add the following environment variable SPRING_PROFILES_ACTIVE=passwordless
az spring app update --name ${CUSTOMERS_SERVICE} \
--jvm-options='-Xms2048m -Xmx2048m' \
--env SPRING_PROFILES_ACTIVE=passwordless
az spring app update --name ${VETS_SERVICE} \
--jvm-options='-Xms2048m -Xmx2048m' \
--env SPRING_PROFILES_ACTIVE=passwordless
az spring app update --name ${VISITS_SERVICE} \
--jvm-options='-Xms2048m -Xmx2048m' \
--env SPRING_PROFILES_ACTIVE=passwordless
In this quickstart, you've deployed an existing Spring Boot-based app using AZD. To learn more about Azure Spring Apps, go to:
- Azure Spring Apps
- Azure Spring Apps docs
- Deploy Spring microservices from scratch
- Deploy existing Spring microservices
- Azure for Java Cloud Developers
- Spring Cloud Azure
- Spring Cloud
This Spring microservices sample is forked from spring-petclinic/spring-petclinic-microservices - see Petclinic README.
This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.
When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.